LEADER 01023nam0-22003251i-450- 001 990004391920403321 005 20040315113826.0 010 $a2-7453-0666-9 035 $a000439192 035 $aFED01000439192 035 $a(Aleph)000439192FED01 035 $a000439192 100 $a19990604d2003----km-y0itay50------ba 101 0 $afre 102 $aFR 105 $af-------001yy 200 1 $aDes liseuses en péril$eles images de lectrices dans les textes de fiction de La prétieuse de l'abbé de Pure à Madame Bovary de Flaubert (1656-1856)$fSandrine Aragon 210 $aParis$cChampion$d2003 215 $a732 p., [8] c.di tav.$d24 cm 225 1 $a<>dix-huitième siècles$v71 610 0 $aDonne$aLetture$aFrancia$a1656-1856 676 $a840.9$v21$zita 700 1$aAragon,$bSandrine$0176780 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004391920403321 952 $aP.3 B 14058$fFLFBC 959 $aFLFBC 996 $aDes liseuses en péril$9542282 997 $aUNINA LEADER 06154nam 22008535 450 001 9910484960503321 005 20251226200557.0 010 $a3-540-30574-2 024 7 $a10.1007/b105222 035 $a(CKB)1000000000212693 035 $a(SSID)ssj0000260165 035 $a(PQKBManifestationID)11204529 035 $a(PQKBTitleCode)TC0000260165 035 $a(PQKBWorkID)10211117 035 $a(PQKB)11418841 035 $a(DE-He213)978-3-540-30574-3 035 $a(MiAaPQ)EBC3068425 035 $a(PPN)123091373 035 $a(BIP)11413590 035 $a(EXLCZ)991000000000212693 100 $a20100704d2005 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTopics in Cryptology -- CT-RSA 2005 $eThe Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings /$fedited by Alfred John Menezes 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (X, 390 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3376 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-24399-2 320 $aIncludes bibliographical references and index. 327 $aInvited Talks -- Sub-linear Queries Statistical Databases: Privacy with Power -- Malicious Cryptography: Kleptographic Aspects -- Cryptanalysis -- Resistance of SNOW 2.0 Against Algebraic Attacks -- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes -- Hold Your Sessions: An Attack on Java Session-Id Generation -- Update on SHA-1 -- A Fast Correlation Attack on the Shrinking Generator -- Public-Key Encryption -- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption -- A Generic Conversion with Optimal Redundancy -- Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 -- Signature Schemes -- Foundations of Group Signatures: The Case of Dynamic Groups -- Time-Selective Convertible Undeniable Signatures -- Design Principles -- On Tolerant Cryptographic Constructions -- Password-Based Protocols -- Simple Password-Based Encrypted Key Exchange Protocols -- Hard Bits of the Discrete Log with Applications to Password Authentication -- Proofs for Two-Server Password Authentication -- Design and Analysis of Password-Based Key Derivation Functions -- Pairings -- A New Two-Party Identity-Based Authenticated Key Agreement -- Accumulators from Bilinear Pairings and Applications -- Computing the Tate Pairing -- Fast and Proven Secure Blind Identity-Based Signcryption from Pairings -- Efficient and Secure Implementation -- A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box -- CryptoGraphics: Secret Key Cryptography Using Graphics Cards -- Side-Channel Leakage of Masked CMOS Gates -- New Minimal Weight Representations for Left-to-Right Window Methods. 330 $aThe RSA Conferenceis attended by over10,000securityprofessionalseach year. The Cryptographers' Track (CT-RSA), one of several parallel tracks at the c- ference, provides an excellent opportunity for cryptographers to showcase their research to a wide audience. CT-RSA 2005 was the ?fth year of the Cryptog- phers' Track. The selection process for the CT-RSA program is the same as for other cryptography research conferences. This year, the program committee selected 23 papers from 74submissions (two of whichwerelater withdrawn) that covered all aspects of cryptography. The program also included two invited talks by Cynthia Dwork and Moti Yung. These proceedings contain the revised versions of the selected papers. The revisions were not checked, and so the authors (and not the committee) bear full responsibility for the contents of their papers. I am very grateful to the program committee for their very conscientious e'orts to review each paper fairly and thoroughly. The initial review stage was followed by a tremendous amount of discussion which contributed to our high con'denceinour judgements.Thanks alsoto the manyexternalreviewerswhose names arelisted in the followingpages.My apologiesto thosewhose nameswere inadvertently omitted from this list. Thanks to Eddie Ng for maintaining the submission server and the Web reviewsystem.ThesubmissionsoftwarewaswrittenbyChanathipNamprempre, and the Web review software by Wim Moreau and Joris Claessens. Thanks to AlfredHofmannandhiscolleaguesatSpringerforthetimelyproductionofthese proceedings.Finally, it is my pleasureto acknowledgeAri Juels and MikeSzydlo of RSA Laboratories for their assistance and cooperation during the past seven months. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3376 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aOperating systems (Computers) 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aComputer networks 606 $aCryptology 606 $aDiscrete Mathematics in Computer Science 606 $aOperating Systems 606 $aIT Operations 606 $aAlgorithms 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aOperating systems (Computers). 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aOperating Systems. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aComputer Communication Networks. 676 $a005.8/2 701 $aMenezes$b A. J$g(Alfred J.),$f1965-$062934 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484960503321 996 $aTopics in cryptology--CT-RSA 2005$94196985 997 $aUNINA